نتایج جستجو برای: random key distribution

تعداد نتایج: 1361267  

2010
Minghua Qu Doug Stinson Scott Vanstone

In 1997, H. Sakazaki, E. Okamato and M. Mambo [4] proposed an ID-based key distribution system on an elliptic curve over Zn. We will cryptanalyze the scheme and demonstrate that when the hashed ID length is about 160 bits, the scheme is insecure. To be specific, after requesting a small number of keys from the Center, our attack allows a new valid key to be constructed without any further inter...

2007
Rakesh Bobba Himanshu Khurana

Decentralized group key management schemes for supporting secure group communication systems have been studied in the two flavors of contributory key agreement and decentralized key distribution. However, the primary focus has been on the former because the latter have been criticized for additional overheads of establishing secure channels and for the possibility of weak keys produced by the g...

Journal: :IEEE Journal of Quantum Electronics 2022

We propose and numerically demonstrate an ultrafast secure key distribution based-on random DNA coding the chaos synchronization in two identical electro-optic oscillators (EO) with common injection. High-quality between responses of EOs extremely sensitivity to mismatching time delay phase bias is observed. It noted that DNA-XOR post-processing can greatly amplify randomness synchronized seque...

2005
Michael Ben-Or Michal Horodecki Debbie W. Leung Dominic Mayers Jonathan Oppenheim

Institute of Computer Science, The Hebrew University, Jerusalem, Israel Institute of Theoretical Physics and Astrophysics, University of Gdańsk, Poland Institute for Quantum Information, California Institute of Technology, Pasadena, USA Mathematical Science Research Institute, Berkeley, USA Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge, UK Isaac N...

2010
Oleksandr Korchenko Yevhen Vasiliu Sergiy Gnatyuk

In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current s...

2004
H. J. Hupkes

We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is assumed about the detector except that the efficiency with which signals are detected is basis in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید